Formal Analysis of Imperfect Cryptographic Protocols
Long Nguyen Hoang
University of Tartu, Institute of Computer Science
Formal Analysis of Imperfect Cryptographic Protocols Long Nguyen - - PowerPoint PPT Presentation
Formal Analysis of Imperfect Cryptographic Protocols Long Nguyen Hoang University of Tartu, Institute of Computer Science Agenda Introduction Probabilistic-spi calculus Security protocol verification Conclusion Q&A
University of Tartu, Institute of Computer Science
Crypto Protocol Analysis Formal Model Computational Model
Protocol Logics Model Checking
Dolev-Yao (perfect cryptography) Random oracle Probabilistic process calculi Probabilistic I/O automata
…
Process Calculi
…
Applied Π-calculus BAN, PCL Murphi, AVISPA
Formal Model Computational Model Attacker actions
decryption with known key (ABSTRACTION) + Any probabilistic poly- time computation Security properties
+ Fine-grained, e.g., secret Security properties
message = not possessing atomic term representing message (ABSTRACTION) + Fine-grained, e.g., secret message = no partial information about bitstring representation Analysis methods + Successful array of tools and techniques; automation
error-prone; no automation
– Probabilistic Polynomial-time equivalence [Mitchell-Scedrov] – Reconciling Two Views of Cryptography [Abadi-Rogaway] – Soundness and completeness of formal encryption [Adao-Bana- Scedrov] – …
and set of rules AR for identifying an attack state qModelCheck(P) Input: Protocol P = (S,R,AR) and probability p Output: 1 if the protocol is secure, 0 otherwise Output: 1 if the protocol is secure, 0 otherwise
5. B=qModelCheck(S’,R,AR); 6. If(B==0) then Return 0;
intruder model) ?